LazyAdmin
Room Link: https://tryhackme.com/room/lazyadmin
Scanning
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found.
Kali
TCP/80 - HTTP

Kali




Link: https://crackstation.net/

Tried to ssh with the credentials but it didn't work, went back to searchsploit because I saw a python script before but it needed credentials. I modified the script to take the input because I waa lazy.
Kali

The php reverse shell setups up a reverse shell so I setup a nc listener on Kali and went to the URL the script mentioned.

Kali

Get autocomplete
Victim

Privilege Escalation
The user has access to run backup.pl without a password, I checked the the file and all it does is run a bash script. We have access to write to copy.sh so I changed it to a reverse shell one liner and setup my listener on Kali.

Kali
Victim

Last updated